Abstract
In recent years, people have witnessed numerous Internet of Things (IoT)-based attacks with the exponential increase in the number of IoT devices. Alongside this, the means to secure IoT-based applications are maturing slower than our budding dependence on them. Moreover, the vulnerabilities in an IoT system are exploited in chains to penetrate deep into the network and yield more adverse aftereffects. To mitigate these issues, this paper gives unique insights for handling the growing vulnerabilities in common IoT devices and proposes a threat architecture for IoT, addressing threats in the context of a three-layer IoT reference architecture. Furthermore, the vulnerabilities exploited at the several IoT attack surfaces and the challenges they exert are explored. Thereafter, the challenges in quantifying the IoT vulnerabilities with the existing framework are also analyzed. The study also covers a case study on the Intelligent Transportation System, covering road transport and traffic control specifically in terms of threats and vulnerabilities. Another case study on secure energy management in the Smart Grid is also presented. This case study covers the applications of Internet of Vulnerable Things (IoVT) in Smart energy Grid solutions, as there will be tremendous use of IoT in future Smart Grids to save energy and improve overall distribution. The analysis shows that the integration of the proposed architecture in existing applications alarms the developers about the embedded threats in the system.
Subject
Energy (miscellaneous),Energy Engineering and Power Technology,Renewable Energy, Sustainability and the Environment,Electrical and Electronic Engineering,Control and Optimization,Engineering (miscellaneous)
Reference71 articles.
1. Internet of Things for Smart Cities
2. Collaborative security for the internet of things;Yosra;Int. J. Comput. Appl.,2013
3. The Internet of (Vulnerable) Things: On Hypponen's Law, Security Engineering, and IoT Legislation
4. Internet of Things (IoT) security best practices;Corser;IEEE Internet Technol. Policy Commun. White Pap.
5. DDoS in the IoT: Mirai and Other Botnets
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献